… article, securetransmission schemes based on beamforming optimization are designed to … Using the transmit beamforming design, we first propose two schemes to protect the privacy …
Y Qi, M Vaezi - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… design precoding and power allocation matrices to achieve the secrecy capacity region of two-user Gaussian MIMO-NOMAnetworks … Then, we design the transmit covariance matrix for …
B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
… securely in the presence of eavesdroppers [12], has not been studied for cooperative NOMA … an approach to secure the transmissions in a two-user cooperative NOMA, using EST as the …
A Salem, L Musavian - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
… Hence, the distance-based users ranking can simplify the design of power allocation and rate adaption for NOMA technique [29]. Consequently, in this work, the users are ordered …
Y Feng, S Yan, Z Yang, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… 1, we consider the securetransmission using NOMA from a base station (BS) to two legitimate users in the presence of a multi-antenna eavesdropper (Eve). The BS is equipped with N …
Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Considering the diversified communication requirements in the Internet-of-Things (IoT) networks, this article proposes a nonorthogonal multiple access (NOMA) scheme which pairs two …
K Cao, B Wang, H Ding, T Li, J Tian… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… (NOMA) is to serve multiple users in the same resource block … resource sharing, a security flaw of NOMA emerges in the … the reliable and securetransmission of NOMA systems with …
C Du, F Zhang, S Ma, Y Tang, H Li, H Wang, S Li - IEEE Access, 2019 - ieeexplore.ieee.org
… rate expression, we propose the optimal secrecy beamforming design for total transmission power minimization problem and minimum secrecy rate maximization problem for the MISO …
X Chen, D Li, Z Yang, Y Chen, N Zhao, Z Ding… - … Network, 2020 - ieeexplore.ieee.org
… Channel Models: In this article, the securetransmission of NOMA-UAV networks is based on … designed to extend securetransmission for several users via beamforming. In addition, AJ …